Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
16-06-2024 07:52
Static task
static1
Behavioral task
behavioral1
Sample
b2725fa0579674b0f4e19fbe271029dc_JaffaCakes118.html
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b2725fa0579674b0f4e19fbe271029dc_JaffaCakes118.html
Resource
win10v2004-20240226-en
General
-
Target
b2725fa0579674b0f4e19fbe271029dc_JaffaCakes118.html
-
Size
33KB
-
MD5
b2725fa0579674b0f4e19fbe271029dc
-
SHA1
7d95db465d946d01badfead5225eaaf11e97331d
-
SHA256
5d5b8eff6f8fa90f019915cdd5aa3a65e25f06396524e96432f7d3ae10a9a24b
-
SHA512
a09a5ecb842dcd24203dd21242bfc087ac1afaf07f900abcf2aeb231b2861301e04550d4228c82c928572e878d28e98915363bb03910815fe7be3a1b1854407c
-
SSDEEP
768:SlgDPZuxCpLl7gSMEpP27A6932dke9AHI:SlgDPZucpR7gSM8C32dkeH
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{76A192B1-2BB5-11EF-A3C1-4A2B752F9250} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\InitHits = "100" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "424686254" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Enable = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Size = "10" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-39690363-730359138-1046745555-1000\Software\Microsoft\Internet Explorer\International\CpMRU\Factor = "20" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2084 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2084 iexplore.exe 2084 iexplore.exe 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE 2976 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2976 2084 iexplore.exe 28 PID 2084 wrote to memory of 2976 2084 iexplore.exe 28 PID 2084 wrote to memory of 2976 2084 iexplore.exe 28 PID 2084 wrote to memory of 2976 2084 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\b2725fa0579674b0f4e19fbe271029dc_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53edf6944c5a9b6e21c5c6a1b2a84adf0
SHA1ec11857588c72143f052ec7b6fcbac06ab7a4bab
SHA256db765162069fceffc486a8a4952ab920b776203944ed49828994cb664f54f476
SHA51295a5e13bbdb51445f76ff6196a8250629dd6a8b84199d2bbb823eeac31fd13697325fb9d4f793a42cd312525d9510957f43d29fffc827212ef6b443aea6c67f3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af7934d59dabd64298862d0a50739afe
SHA181266dfda024f6582c1b1f7661cf7575efcb9255
SHA2567ee1541b5e929cd8ee9c472a677b8f0667f615e19410da3e7c174d98cbfc2e43
SHA51249e4c11b90458932af27afafdf2abfaf9f4b1437e982d2879dc39808e8585785dfe432076e9c52aeed86eb5fef94f6942cfa8cb3a8617a3d16711ebbae4358da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f4081ac60068d6779e136ae3058b054e
SHA1bf5705f494c4b21515bf5eb2b42f20a1e49cf6bc
SHA256cdf4912df0ec09847757c5e02e9791c586a02adac26a0a576f50a07f909edc54
SHA5122ffe426a339d670a68079ef3b9c22d195c024f31bcf5ff90d36cd10f3260fc4c9455fc5710f156bf00ad08d4378c81e8601ece2b5543630b23996ad04f7e61ea
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD534b437f41f00d6d040c258a842610bd0
SHA1f41c298cdfc307192c2d34ae2097f43e14eb153b
SHA256cfd54a3c07565781e461ed1f3f7e832e0e7a1481fcf0ce12aa0b900663580540
SHA51288b0510f328066af4173ef6290ba840e26faee59a7a46a9d0eeb05460771773294cfda2675891331eb4c979ae2df8c13681e8571ad2bc70e09d1e8227ab7610e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dca0d1a33ea4ff53170103e424a7eae4
SHA167a534ea6365b50558c7f5c3e35a62d1a5337a1d
SHA256f473a5ab9d1a89d5505160af4050c38ea148a452b4a6052cf094e9bbda660280
SHA5120fcfaf5deee41197abb26d3e814e1dcced41e3361105cc14fb6030c9dfebe1c6d2c8514050154037e46200a1428638bae64d3f371cdd58a3251ec076846b4dbf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD568c430105ab4b3023c54c2174a397842
SHA10efb9f5dd938ae9bc2b68657c3e7bb482ab33335
SHA2569c4d426214879b4c1112a29c1ad0238cc275d4de01d7547405618d4b8c8b39b0
SHA512243586a9159f45d7787452739067f522bbfa5eebff0172e47d306938a8642c552e8073162c5a17ee5c56963189232c01e8f480788e3b0d532093a38eba545fce
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52e3a2e87d457ee995ee4c32a2b0de8ea
SHA1ccbf0f4830eeb3b09770d6f1e6530daecbc5fbef
SHA25686936e10576f3a4e7ccbcf15548dda3f99fabe4d1a8294d57104da44bc1ab36b
SHA512bc9b96d0f1fff164ee18de26c4ee07f6f96191eeffe2fff0c9b84c82a00092f5d571f105e36102f7f83ccd1f5a233f377180b30b1ae4bd44c1d1f28e2313fd79
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD59d0e1a6531f148097c0df2a5f4ead3cc
SHA1bd8eb756d90f5c8781e0189a9c6e9e2cc297b7df
SHA2560ebf794cd4d0e9abcf8a75759cea4a9cf193a4a6d2106b247da7226880ac1c06
SHA5121b99fdea4c7712131bf42d02d1c7a431e8784b0b9a26acce8c3a9293d0110b348df4be98a77d63b8686a05e3026039e27bfeedd83f16d72ee889a8506ea891c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD562add2a74a14765c5a1f6257e558cceb
SHA1c68f073affa3a6803c21b253347b856c37774b09
SHA256f193fbc54c24a1d0c098d81948df6ca714c4fcf845c2ca102e50910810859224
SHA5129133fee8b096743551e0566d9554c5e691b906d2126cf8dc0aacd4a712bbdee7a23849bdd3aeb13a68aa952b1701fdc69df57052ab16a26e696f83507c9ceabf
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a82dbabfeb7d8733ef209a19825f8f08
SHA10cf0fe29b0cac7b412712af4d0ef25744946c7b9
SHA2567aee6063f363bacd7398842273632a42a3e7783710f6c18940b1aad3e2c1951a
SHA512ad80f963301122b25d7e8abcc9112620185790e71d1d115003aad137f54cb9bf33d2de08f2e68a72d0c63422345e823b13d69a2945406fa5ea18218e7313b9a4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b